Flylib.com
MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network: Study Guide and DVD Training System (Exam 70-214)
MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network: Study Guide and DVD Training System (Exam 70-214)
ISBN: 1931836841
EAN: 2147483647
Year: 2003
Pages: 162
Authors:
Will Schmied
,
Thomas W. Shinder
BUY ON AMAZON
Table of Contents
BackCover
MCSEMCSA Implementing Administering Security in a Windows 2000 Network Study Guide (Exam 70-214)
Foreword
The Path to MCSA and MCSE
Your Exam Day Experience
Final Thoughts
Part I: Implementing, Managing, and Troubleshooting Baseline Security
Chapter 1: Basic Windows 2000 Security: Using Security Templates
Windows 2000 Active Directory Review
The Basic Windows 2000 Security Tools
Exam 70-124: Objective 1.1: Configuring Basic Windows 2000 Security with Templates
Exam 70-124: Objective 1.2: Deploying Security Templates
Exam 70-124: Objective 1.2: Analyzing Your Security Configuration
Summary of Exam Objectives
Exam Objectives Fast Track
Exam Objectives Frequently Asked Questions
Self Test
Chapter 2: Advanced Security Template and Group Policy Issues
Exam 70-124: Objective 1.4: Configuring Role-Based Server Security
Exam 70-124: Objective 1.5: Creating Secure Workstations
Exam 70-124: Objective 1.3: Security Template Application Issues
Exam 70-124: Objective 3.4: Securing Server Message Block Traffic
Summary of Exam Objectives
Exam Objectives Fast Track
Exam Objectives Frequently Asked Questions
Self Test
Part II: Implementing, Managing, and Troubleshooting Service Packs and Security Updates
Chapter 3: Identifying, Installing, and Troubleshooting Required Updates
Exam 70-124: Objective 2.1: Identifying Required Updates
Exam 70-124: Objective 2.2, 2.3: Deploying and Managing Updates
Exam 70-124: Objective 2.4: Troubleshooting Update Installations
Summary of Exam Objectives
Exam Objectives Fast Track
Exam Objectives Frequently Asked Questions
Self Test
Part III: Implementing and Managing a Public Key Infrastructure (PKI) and Encrypting File System (EFS)
Chapter 4: Installing, Configuring, Managing Windows 2000 Certificate Authorities
Cryptography and You: What is it All About?
Exam 70-124: Objective 3.1.4: Certificate Authorities
Exam 70-124: Objective 5.1, 5.1.1, 5.2: Installing and Managing Windows 2000 Certificate Authorities
Exam 70-124: Objective 5.3: Advanced Certificate Management Issues
Summary of Exam Objectives
Exam Objectives Fast Track
Exam Objectives Frequently Asked Questions
Self Test
Chapter 5: Managing and Troubleshooting the Encrypting File System
The Role of EFS in a Network Security Plan
Using the Encrypting File System
Exam 70-124: Objective 5.4: User Operations
Exam 70-124: Objective 5.4: EFS Architecture and Troubleshooting
Summary of Exam Objectives
Exam Objectives Fast Track
Exam Objectives Frequently Asked Questions
Self Test
Part IV: Implementing, Managing, and Troubleshooting Secure Communication Channels
Chapter 6: Configuring and Troubleshooting Windows IP Security
The Need for Network Security
IP Security Overview
IP Security Management Tools
Exam 70-124: Objective 3.1, 3.1.1, 3.2: Deploying and Troubleshooting Windows IP Security
Summary of Exam Objectives
Exam Objectives Fast Track
Exam Objectives Frequently Asked Questions
Self Test
Chapter 7: Implementing Secure Wireless Networks
Exam 70-124: Objective 3.3: Wireless LAN Security Issues
Exam 70-124: Objective 3.3.1, 3.3.3: Configuring Windows Client Computers for Wireless LAN Security
Summary of Exam Objectives
Exam Objectives Fast Track
Exam Objectives Frequently Asked Questions
Self Test
Part V: Configuring, Managing, and Troubleshooting Authentication and Remote Access Security
Chapter 8: Configuring Secure Network and Internet Authentication Methods
Network Authentication in Windows 2000
Kerberos Overview
Kerberos in Windows 2000
Exam 70-124: Objective 4.1.4: Configuring Kerberos Trusts
Exam 70-124: Objective 4.1, 4.1.1: Configuring User Authentication
Exam 70-124: Objective 4.1.5, 4.2: Configuring Web Authentication
Summary of Exam Objectives
Exam Objectives Fast Track
Exam Objectives Frequently Asked Questions
Self Test
Chapter 9: Configuring and Troubleshooting Remote Access and VPN Authentication
Exam 70-124: Objective 4.3: Remote Access Authentication Methods
Exam 70-124: Objective 4.4: Configuring a Remote Access Server
Exam 70-124: Objective 4.4: Configuring a Virtual Private Networking Server
Exam 70-124: Objective 4.3, 4.4: Configuring Network Clients for Secure Remote Access
Troubleshooting Remote Access Problems
Summary of Exam Objectives
Exam Objectives Fast Track
Exam Objectives Frequently Asked Questions
Self Test
Part VI: Monitoring and Responding to Security Incidents
Chapter 10: Configuring and Using Auditing and the Event Logs
Auditing for Increased Security
Exam 70-124: Objective 6.1: Auditing Windows 2000
Exam 70-124: Objective 6.1, 6.1.1, 6.2: Auditing Best Practices
Exam 70-124: Objective 6.1: Auditing Internet Information Services
Exam 70-124: Objective 6.1.2: Windows Auditing Tools
Summary of Exam Objectives
Exam Objectives Fast Track
Exam Objectives Frequently Asked Questions
Self Test
Chapter 11: Responding to and Recovering from Security Breaches
Exam 70-124: Objective 6.3: Security Incidents
Exam 70-124: Objective 6.3: Malware Issues
Exam 70-124: Objective 6.3, 6.3.2, 6.3.3: Incident Response
Forensics
Summary of Exam Objectives
Exam Objectives Fast Track
Exam Objectives Frequently Asked Questions
Self Test
Part VII: Appendixes
Appendix A: Utilities for the White Hat
Introduction
White Hat Vulnerability Testing
White Hat Protection Tools
Summary
Appendix B: Port Numbers and Associated Attacks
Port Numbers
Appendix C: Self Test Questions, Answers, and Explanations
Chapter 2: Advanced Security Template and Group Policy Issues
Chapter 3: Identifying, Installing, and Troubleshooting Required Updates
Chapter 4: Installing, Configuring, and Managing Windows 2000 Certificate Authorities
Chapter 5: Managing and Troubleshooting the Encrypting File System
Chapter 6: Configuring and Troubleshooting Windows IP Security
Chapter 7: Implementing Secure Wireless Networks
Chapter 8: Configuring Secure Network and Internet Authentication Methods
Chapter 9: Configuring and Troubleshooting Remote Access and Virtual Private Networking Authentication
Chapter 10: Configuring and Using Auditing and the Event Logs
Chapter 11: Responding to and Recovering from Security Breaches
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
List of Exercises
List of Sidebars
MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network: Study Guide and DVD Training System (Exam 70-214)
ISBN: 1931836841
EAN: 2147483647
Year: 2003
Pages: 162
Authors:
Will Schmied
,
Thomas W. Shinder
BUY ON AMAZON
Crystal Reports 9 on Oracle (Database Professionals)
Connectivity, Authentication, and Privileges
Oracle Advanced SELECT Options
Optimizing: Reducing Parses
Appendix A Common Issues
Appendix B Functions
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 4. Get the Birds-Eye View
Hacks 1016: Introduction
Hack 25. Track Your UPS Packages
Hack 37. View Your GPS Tracklogs in Google Maps
Hack 64. Build Custom Icons on the Fly
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
3-D Layers from Photoshop Layers
Matte and Keying Plug-ins
Motion Matte Painting in Photoshop
Atmosphere, Film, and Noise Effects
Motion Titling Effects
Web Systems Design and Online Consumer Behavior
Chapter III Two Models of Online Patronage: Why Do Consumers Shop on the Internet?
Chapter VI Web Site Quality and Usability in E-Commerce
Chapter VII Objective and Perceived Complexity and Their Impacts on Internet Communication
Chapter X Converting Browsers to Buyers: Key Considerations in Designing Business-to-Consumer Web Sites
Chapter XVIII Web Systems Design, Litigation, and Online Consumer Behavior
Java All-In-One Desk Reference For Dummies
Making Choices
Going Around in Circles (Or, Using Loops)
Making Your Own Classes
Creating Generic Collection Classes
Swinging into Swing
Understanding Digital Signal Processing (2nd Edition)
REFERENCES
DFT MAGNITUDES
Chapter Six. Infinite Impulse Response Filters
COMBINING DECIMATION AND INTERPOLATION
COMPUTING FFT TWIDDLE FACTORS
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies